First published: Wed Dec 07 2022(Updated: )
Improper validation of syntactic correctness of input vulnerability exist in Movable Type series. Having a user to access a specially crafted URL may allow a remote unauthenticated attacker to set a specially crafted URL to the Reset Password page and conduct a phishing attack. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Sixapart Movable Type | <=1.53 | |
Sixapart Movable Type | <=1.53 | |
Sixapart Movable Type | >=6.0<6.8.7 | |
Sixapart Movable Type | >=6.0<6.8.7 | |
Sixapart Movable Type | >=7.0<7.9.6 | |
Sixapart Movable Type | >=7.0<7.9.6 | |
<=1.53 | ||
<=1.53 | ||
>=6.0<6.8.7 | ||
>=6.0<6.8.7 | ||
>=7.0<7.9.6 | ||
>=7.0<7.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-45113.
CVE-2022-45113 has a severity rating of 6.5 (medium).
The Sixapart Movable Type software versions 1.53, 6.0 to 6.8.7, and 7.0 to 7.9.6 are affected by CVE-2022-45113.
An attacker can exploit CVE-2022-45113 by having a user access a specially crafted URL to the Reset Password page, allowing for a phishing attack.
You can find more information about CVE-2022-45113 on the [JVN website](https://jvn.jp/en/jp/JVN37014768/index.html) and the [Movable Type website](https://movabletype.org/news/2022/11/mt-796-688-released.html).